Build Resilience Against Ransomware Attacks

Prevent ransomware incursions and defend against ransomware attacks.

Book This Workshop

Ransomware is a high-profile threat that demands immediate attention:

  • Organizations large and small hit by ransomware make the news every week.
  • Executives want reassurance – but aren’t ready to write a blank check. Improvements must be targeted and justified.
  • No one is bulletproof, so the ability to recover from (not just prevent) a ransomware attack is critical. Yet backup and disaster recovery capabilities are often lacking.

Take specific actions to improve your ability to prevent and respond to a ransomware attack:

  • Execute a systematic assessment of your current security and disaster recovery (DR) practices to identify gaps and quick wins.
  • Quantify ransomware risk to prioritize investments and drive security awareness.
  • Run tabletop planning exercises to plan for ransomware attacks, build a more effective incident response plan, and further identify projects to help close gaps.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book Now

Member Rating

9.4/10
Overall Impact

$76,494
Average $ Saved

32
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

Module 1: Assess ransomware resilience 

The Purpose

  • Set workshop goals, review ransomware trends and risk scenarios, and assess the organization’s resilience to ransomware attacks.

Key Benefits Achieved

  • Develop a solid understanding of the likelihood and impact of a ransomware attack on your organization.
  • Complete a current state assessment of key security controls in a ransomware context.

Activities: Outputs:
1.1 Review incidents, challenges, and project drivers.
1.2 Diagram critical systems and dependencies and build risk scenario.
1.3 Build ransomware risk scenario.
  • Ransomware Resilience Assessment. 
  • Ransomware Risk Scenario

Module 2: Protect and detect 

The Purpose

  • Improve your capacity to protect your organization from ransomware and detect attacks along common vectors.

Key Benefits Achieved

  • Identify targeted countermeasures that improve protection and detection capabilities.

Activities: Outputs:
2.1 Assess ransomware threat preparedness. 
2.2 Determine the impact of ransomware techniques on your environment. 
2.3 Identify countermeasures to improve protection and detection capabilities.
  • Targeted ransomware countermeasures to improve protection and detection capabilities. 

Module 3: Respond and recover 

The Purpose

  • · Improve your organization’s capacity to respond to ransomware attacks and recover effectively.

Key Benefits Achieved

  • Build response and recovery capabilities that reduce the potential business disruption of successful ransomware attacks.

Activities: Outputs:
3.1 Review the workflow and runbook templates.
3.2 Update/define your threat escalation protocol.
3.3 Define scenarios for a range of incidents.
3.4 Run a tabletop planning exercise (IT).
3.5 Update your ransomware response workflow.
3.6 Update your ransomware response runbook.
  • Security incident response plan assessment
  • Tabletop test (IT) 
  • Ransomware workflow and runbook

Module 4: Improve ransomware resilience 

The Purpose

Identify prioritized initiatives to improve ransomware resilience.

Key Benefits Achieved

  • Identify the role of leadership in ransomware response and recovery.
  • Communicate workshop outcomes and recommend initiatives to improve ransomware resilience.

Activities: Outputs:
4.1 Run a tabletop planning exercise (Leadership).
4.2 Identify initiatives to close gaps and improve resilience.
4.3 Review broader strategies to improve your overall security program.
4.4 Prioritize initiatives based on factors such as effort, cost, and risk.
4.5 Review the dashboard to fine tune your roadmap.
4.6 Summarize status and next steps in an executive presentation.
  • Ransomware resilience roadmap and metrics
  • Tabletop test (leadership) 
  • Completed ransomware resilience roadmap
  • Ransomware resilience assessment
  • Ransomware resilience summary presentation
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171